Vulnerability Details CVE-2026-31987
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors.
Users are advised to upgrade to Airflow version that contains fix.
Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 9.1%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-31987
-
cpe:2.3:a:apache:airflow:3.0.0
-
cpe:2.3:a:apache:airflow:3.0.1
-
cpe:2.3:a:apache:airflow:3.0.2
-
cpe:2.3:a:apache:airflow:3.0.3
-
cpe:2.3:a:apache:airflow:3.0.4
-
cpe:2.3:a:apache:airflow:3.0.5
-
cpe:2.3:a:apache:airflow:3.0.6
-
cpe:2.3:a:apache:airflow:3.1.0
-
cpe:2.3:a:apache:airflow:3.1.1
-
cpe:2.3:a:apache:airflow:3.1.2
-
cpe:2.3:a:apache:airflow:3.1.3
-
cpe:2.3:a:apache:airflow:3.1.4
-
cpe:2.3:a:apache:airflow:3.1.5
-
cpe:2.3:a:apache:airflow:3.1.6
-
cpe:2.3:a:apache:airflow:3.1.7
-
cpe:2.3:a:apache:airflow:3.1.8